Android Offloading Computation Over Cloud

In this project, we present a framework for automated offloading of the computation intensive applications of their smartphones over to the virtual processing over cloud through its smartphone image online. An offloading framework is proposed, which if used by the developers of the application, will empower the application to offload its compute intensive, non-interactive parts […]

Continue reading


University Campus Online Automation Using Cloud Computing

Download Project Document/Synopsis University campus online automation system, is a recruitment system that is beneficial for a college student, college placement faculty and Companies visiting the campus. This software has three login portal, for students, placement faculty and companies visiting the campus. Students will enter all their personal as well as professional while registering themselves […]

Continue reading


Secure Text Transfer Using Diffie Hellman Key Exchange Based on Cloud

Download Project Document/Synopsis Encryption is the technique of hiding private or sensitive information within something that appears to be nothing be a usual. If a person views that cipher text, he or she will have no idea that there is any secret information. What encryption essentially does is exploit human perception, human senses are not […]

Continue reading


Intelligent rule-based phishing websites classification Based on URL Features

Download Project Document/Synopsis There are number of users who purchase products online and make payment through e- banking. There are e- banking websites who ask user to provide sensitive data such as username, password or credit card details etc. often for malicious reasons. This type of e-banking websites is known as phishing website. In order […]

Continue reading


Detecting Data Leaks via Sql Injection Prevention on an E-Commerce

Download Project Document/Synopsis The objective of this project is to prevent SQL injection while firing queries to database and to make the database secured. This system is online so no need of implementation. It can be accessed through internet from anywhere. The system uses SQL Injection mechanism prevention to keep the data safe and secure […]

Continue reading